Skip to content

Commit eff091c

Browse files
committed
doc: Make some index terms and terminology more consistent
1 parent 241e684 commit eff091c

File tree

3 files changed

+4
-13
lines changed

3 files changed

+4
-13
lines changed

doc/src/sgml/ddl.sgml

Lines changed: 2 additions & 11 deletions
Original file line numberDiff line numberDiff line change
@@ -1512,20 +1512,11 @@ REVOKE ALL ON accounts FROM PUBLIC;
15121512
<title>Row Security Policies</title>
15131513

15141514
<indexterm zone="ddl-rowsecurity">
1515-
<primary>rowsecurity</primary>
1515+
<primary>row security</primary>
15161516
</indexterm>
15171517

15181518
<indexterm zone="ddl-rowsecurity">
1519-
<primary>rls</primary>
1520-
</indexterm>
1521-
1522-
<indexterm>
1523-
<primary>policies</primary>
1524-
<see>policy</see>
1525-
</indexterm>
1526-
1527-
<indexterm zone="ddl-rowsecurity">
1528-
<primary>POLICY</primary>
1519+
<primary>policy</primary>
15291520
</indexterm>
15301521

15311522
<para>

doc/src/sgml/ref/create_policy.sgml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -112,7 +112,7 @@ CREATE POLICY <replaceable class="parameter">name</replaceable> ON <replaceable
112112
the user running the overall query. Therefore, users who are using a given
113113
policy must be able to access any tables or functions referenced in the
114114
expression or they will simply receive a permission denied error when
115-
attempting to query the RLS-enabled table. This does not change how views
115+
attempting to query the table that has row-level security enabled. This does not change how views
116116
work, however. As with normal queries and views, permission checks and
117117
policies for the tables which are referenced by a view will use the view
118118
owner's rights and any policies which apply to the view owner.

doc/src/sgml/ref/create_role.sgml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -196,7 +196,7 @@ CREATE ROLE <replaceable class="PARAMETER">name</replaceable> [ [ WITH ] <replac
196196
<term><literal>NOBYPASSRLS</literal></term>
197197
<listitem>
198198
<para>
199-
These clauses determine whether a role is allowed to bypass row-security
199+
These clauses determine whether a role is allowed to bypass row-level security (RLS)
200200
policies. A role having the <literal>BYPASSRLS</literal> attribute will
201201
be allowed to bypass row-security policies by setting
202202
<literal>row_security</literal> to

0 commit comments

Comments
 (0)
pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy